default search action
Fangguo Zhang
Person information
- affiliation: Sun Yat-sen University, School of Computer Science and Engineering, Guangzhou, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j114]Chao Chen, Fangguo Zhang, Zhiyuan An, Jing Zhang:
ISH: Isogeny-based Secret Handshakes with friendly communication costs. Comput. Stand. Interfaces 91: 103880 (2025) - 2024
- [j113]Haibo Tian, Yanchuan Wen, Fangguo Zhang, Yunfeng Shao, Bingshuai Li:
Lattice based distributed threshold additive homomorphic encryption with application in federated learning. Comput. Stand. Interfaces 87: 103765 (2024) - [j112]Yang Yang, Peidong Guan, Haibo Tian, Fangguo Zhang:
Elliptic code-based oblivious polynomial evaluation. Comput. Stand. Interfaces 90: 103846 (2024) - [j111]Huang Zhang, Ting Huang, Fangguo Zhang, Baodian Wei, Yusong Du:
Self-Bilinear Map from One Way Encoding System and i𝒪. Inf. 15(1): 54 (2024) - [c103]Chao Chen, Fangguo Zhang:
Parallel Algorithms on Hyperelliptic Pairings Using Hyperelliptic Nets. ACISP (1) 2024: 429-449 - [c102]Chunhui Wu, Siwei Jiang, Fangguo Zhang, Yusong Du, Qiping Lin:
An Efficient Threshold Ring Signature from G+G Identification Protocol. DSPP (1) 2024: 211-221 - [i60]Chen Li, Fangguo Zhang:
Designated-Verifier zk-SNARKs Made Easy. IACR Cryptol. ePrint Arch. 2024: 1153 (2024) - 2023
- [j110]Zheng Zhang, Fangguo Zhang:
New Obfuscation Scheme for Conjunctions. Comput. J. 66(11): 2773-2781 (2023) - [j109]Chao Chen, Fangguo Zhang:
Verifiable delay functions and delay encryptions from hyperelliptic curves. Cybersecur. 6(1): 54 (2023) - [j108]Yu Dai, Fangguo Zhang, Chang-An Zhao:
Fast hashing to G2 on pairing-friendly curves with the lack of twists. Finite Fields Their Appl. 91: 102263 (2023) - [j107]Chao Chen, Fangguo Zhang, Changan Zhao:
Isogeny computation on Kummer lines and applications. J. Inf. Secur. Appl. 76: 103546 (2023) - [j106]Chao Chen, Peidong Guan, Yan Huang, Fangguo Zhang:
Quantum circuits for hyperelliptic curve discrete logarithms over the Mersenne prime fields. Quantum Inf. Process. 22(7): 274 (2023) - [j105]Yu Dai, Fangguo Zhang, Chang-An Zhao:
Don't Forget Pairing-Friendly Curves with Odd Prime Embedding Degrees. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(4): 393-419 (2023) - [j104]Zhiyuan An, Jing Pan, Yamin Wen, Fangguo Zhang:
Secret handshakes: Full dynamicity, deniability and lattice-based design. Theor. Comput. Sci. 940(Part): 14-35 (2023) - [c101]Ruozhou Zuo, Haibo Tian, Fangguo Zhang:
Post-quantum Dropout-Resilient Aggregation for Federated Learning via Lattice-Based PRF. AIS&P (1) 2023: 382-399 - [c100]Chen Li, Haibo Tian, Fangguo Zhang:
TVES: Threshold Verifiably Encrypted Signature and Its Applications. Inscrypt (1) 2023: 3-22 - [c99]Haibin Zhang, Sisi Duan, Chao Liu, Boxin Zhao, Xuanji Meng, Shengli Liu, Yong Yu, Fangguo Zhang, Liehuang Zhu:
Practical Asynchronous Distributed Key Generation: Improved Efficiency, Weaker Assumption, and Standard Model. DSN 2023: 568-581 - [c98]Zhiyuan An, Haibo Tian, Chao Chen, Fangguo Zhang:
Deniable Cryptosystems: Simpler Constructions and Achieving Leakage Resilience. ESORICS (1) 2023: 24-44 - [i59]Zhiyuan An, Haibo Tian, Chao Chen, Fangguo Zhang:
Deniable Cryptosystems: Simpler Constructions and Achieving Leakage Resilience. IACR Cryptol. ePrint Arch. 2023: 705 (2023) - [i58]Yu Dai, Fangguo Zhang, Chang-An Zhao:
Don't Forget Pairing-Friendly Curves with Odd Prime Embedding Degrees. IACR Cryptol. ePrint Arch. 2023: 1542 (2023) - 2022
- [j103]Yan Huang, Fangguo Zhang, Zhijie Liu, Haibo Tian:
Pseudorandom number generator based on supersingular elliptic curve isogenies. Sci. China Inf. Sci. 65(5): 1-3 (2022) - [j102]Jing Pan, Jiang Zhang, Fangguo Zhang, Xiaofeng Chen, Willy Susilo:
Lattice-based group encryptions with only one trapdoor. Sci. China Inf. Sci. 65(5): 1-18 (2022) - [j101]Wanhua Li, Lingling Xu, Yamin Wen, Fangguo Zhang:
Conjunctive multi-key searchable encryption with attribute-based access control for EHR systems. Comput. Stand. Interfaces 82: 103606 (2022) - [j100]Yanmei Cao, Jianghong Wei, Fangguo Zhang, Yang Xiang, Xiaofeng Chen:
Efficient public-key authenticated deniable encryption schemes. Comput. Stand. Interfaces 82: 103620 (2022) - [j99]Yu Dai, Zijian Zhou, Fangguo Zhang, Chang-An Zhao:
Software Implementation of Optimal Pairings on Elliptic Curves with Odd Prime Embedding Degrees. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 105-A(5): 858-870 (2022) - [j98]Kaizhan Lin, Fangguo Zhang, Chang-An Zhao:
Faster Key Generation of Supersingular Isogeny Diffie-Hellman. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 105-A(12): 1551-1558 (2022) - [j97]Ping Wang, Weiqian Chen, Songlian Lin, Liyan Liu, Zhiwei Sun, Fangguo Zhang:
Consensus algorithm based on verifiable quantum random numbers. Int. J. Intell. Syst. 37(10): 6857-6876 (2022) - [j96]Zheng Zhang, Shaohao Xie, Fangguo Zhang:
Topology-hiding garbled circuits without universal circuits. Int. J. Inf. Sec. 21(2): 341-356 (2022) - [j95]Yan Huang, Yan Jin, Zhi Hu, Fangguo Zhang:
Optimizing the evaluation of ℓ-isogenous curve for isogeny-based cryptography. Inf. Process. Lett. 178: 106301 (2022) - [j94]Yunqi Wan, Li Chen, Fangguo Zhang:
Algebraic Soft Decoding of Elliptic Codes. IEEE Trans. Commun. 70(3): 1522-1534 (2022) - [c97]Haibo Tian, Yanchuan Wen, Fangguo Zhang, Yunfeng Shao, Bingshuai Li:
A Distributed Threshold Additive Homomorphic Encryption for Federated Learning with Dropout Resiliency Based on Lattice. CSS 2022: 277-292 - [c96]Ruozhou Zuo, Haibo Tian, Zhiyuan An, Fangguo Zhang:
Post-quantum Privacy-Preserving Aggregation in Federated Learning Based on Lattice. CSS 2022: 314-326 - [c95]Yunqi Wan, Li Chen, Fangguo Zhang:
Algebraic Chase Decoding of Elliptic Codes Through Computing the Gröbner Basis. ISIT 2022: 180-185 - [c94]Jianzhang Chen, Haibo Tian, Fangguo Zhang:
Searching for Encrypted Data on Blockchain: An Efficient, Secure and Fair Realization. ISC 2022: 194-213 - [c93]Zhiyuan An, Jing Pan, Yamin Wen, Fangguo Zhang:
Forward-Secure Revocable Secret Handshakes from Lattices. PQCrypto 2022: 453-479 - [c92]Zhuoran Zhang, Haibo Tian, Fangguo Zhang:
Improved WAVE Signature and Apply to Post-quantum Blockchain. SocialSec 2022: 309-323 - [i57]Yu Dai, Fangguo Zhang, Chang-An Zhao:
Fast Hashing to G2 in Direct Anonymous Attestation. IACR Cryptol. ePrint Arch. 2022: 996 (2022) - [i56]Ping Wang, Yiting Su, Fangguo Zhang:
Secure Quantum Bit Commitment. IACR Cryptol. ePrint Arch. 2022: 1238 (2022) - [i55]Haibin Zhang, Sisi Duan, Chao Liu, Boxin Zhao, Xuanji Meng, Shengli Liu, Yong Yu, Fangguo Zhang, Liehuang Zhu:
Practical Asynchronous Distributed Key Generation: Improved Efficiency, Weaker Assumption, and Standard Model. IACR Cryptol. ePrint Arch. 2022: 1678 (2022) - 2021
- [j93]Zheng Zhang, Fangguo Zhang:
Functional encryption for cubic polynomials and implementation. Theor. Comput. Sci. 885: 41-54 (2021) - [j92]Lingling Xu, Xiaofeng Chen, Fangguo Zhang, Wanhua Li, Hao-Tian Wu, Shaohua Tang, Yang Xiang:
ASBKS: Towards Attribute Set Based Keyword Search Over Encrypted Personal Health Records. IEEE Trans. Dependable Secur. Comput. 18(6): 2941-2952 (2021) - [j91]Yunqi Wan, Li Chen, Fangguo Zhang:
Guruswami-Sudan Decoding of Elliptic Codes Through Module Basis Reduction. IEEE Trans. Inf. Theory 67(11): 7197-7209 (2021) - [j90]Shaohao Xie, Fangguo Zhang, Rong Cheng:
Security Enhanced RFID Authentication Protocols for Healthcare Environment. Wirel. Pers. Commun. 117(1): 71-86 (2021) - [c91]Jing Pan, Xiaofeng Chen, Fangguo Zhang, Willy Susilo:
Forward-Secure Group Encryptions from Lattices. ACISP 2021: 610-629 - [c90]Jing Pan, Xiaofeng Chen, Fangguo Zhang, Willy Susilo:
Lattice-Based Group Encryption with Full Dynamicity and Message Filtering Policy. ASIACRYPT (4) 2021: 156-186 - [c89]Mohamed Nassurdine, Huang Zhang, Fangguo Zhang:
Identity Based Linkable Ring Signature with Logarithmic Size. Inscrypt 2021: 42-60 - [c88]Zhiyuan An, Zhuoran Zhang, Yamin Wen, Fangguo Zhang:
Lattice-Based Secret Handshakes with Reusable Credentials. ICICS (2) 2021: 231-248 - [c87]Yunqi Wan, Li Chen, Fangguo Zhang:
Algebraic Soft Decoding of Elliptic Codes. ISIT 2021: 521-526 - [c86]Peidong Guan, Yunqi Wan, Zhuoran Zhang, Fangguo Zhang:
Efficient List Decoding Applied to $\mathrm{ECC}^2$. PDCAT 2021: 560-567 - [c85]Zhuoran Zhang, Zheng Zhang, Fangguo Zhang:
Inner-Product Functional Encryption from Random Linear Codes: Trial and Challenges. ProvSec 2021: 259-276 - [i54]Haibo Tian, Fangguo Zhang, Yunfeng Shao, Bingshuai Li:
Secure Linear Aggregation Using Decentralized Threshold Additive Homomorphic Encryption For Federated Learning. CoRR abs/2111.10753 (2021) - [i53]Yu Dai, Zijian Zhou, Fangguo Zhang, Chang-An Zhao:
Software Implementation of Optimal Pairings on Elliptic Curves with Odd Prime Embedding Degrees. IACR Cryptol. ePrint Arch. 2021: 1162 (2021) - [i52]Kaizhan Lin, Fangguo Zhang, Chang-An Zhao:
Faster Key Generation of Supersingular Isogeny Diffie-Hellman. IACR Cryptol. ePrint Arch. 2021: 1320 (2021) - [i51]Chao Chen, Fangguo Zhang:
Richelot Isogenies, Pairings on Squared Kummer Surfaces and Applications. IACR Cryptol. ePrint Arch. 2021: 1617 (2021) - 2020
- [j89]Yamin Wen, Fangguo Zhang, Huaxiong Wang, Yinbin Miao, Zheng Gong:
Intersection-policy private mutual authentication from authorized private set intersection. Sci. China Inf. Sci. 63(2): 122101 (2020) - [j88]Zehong Chen, Fangguo Zhang, Peng Zhang, Hanbang Zhao:
Multi-user Boolean searchable encryption supporting fast ranking in mobile clouds. Comput. Commun. 164: 100-113 (2020) - [j87]Huang Zhang, Fangguo Zhang, Baodian Wei, Yusong Du:
Implementing confidential transactions with lattice techniques. IET Inf. Secur. 14(1): 30-38 (2020) - [j86]Yamin Wen, Fangguo Zhang, Huaxiong Wang, Zheng Gong, Yinbin Miao, Yuqiao Deng:
A new secret handshake scheme with multi-symptom intersection for mobile healthcare social networks. Inf. Sci. 520: 142-154 (2020) - [j85]Fangguo Zhang, Zhuoran Zhang, Peidong Guan:
ECC2: Error correcting code and elliptic curve based cryptosystem. Inf. Sci. 526: 301-320 (2020) - [j84]Yan Huang, Zhaofeng Su, Fangguo Zhang, Yong Ding, Rong Cheng:
Quantum algorithm for solving hyperelliptic curve discrete logarithm problem. Quantum Inf. Process. 19(2): 62 (2020) - [j83]Fan Zhang, Bolin Yang, Xiaofei Dong, Sylvain Guilley, Zhe Liu, Wei He, Fangguo Zhang, Kui Ren:
Side-Channel Analysis and Countermeasure Design on ARM-Based Quantum-Resistant SIKE. IEEE Trans. Computers 69(11): 1681-1693 (2020) - [j82]Lingling Xu, Wanhua Li, Fangguo Zhang, Rong Cheng, Shaohua Tang:
Authorized Keyword Searches on Public Key Encrypted Data With Time Controlled Keyword Privacy. IEEE Trans. Inf. Forensics Secur. 15: 2096-2109 (2020) - [j81]Yang Shi, Wujing Wei, Fangguo Zhang, Xiapu Luo, Zongjian He, Hongfei Fan:
SDSRS: A Novel White-Box Cryptography Scheme for Securing Embedded Devices in IIoT. IEEE Trans. Ind. Informatics 16(3): 1602-1616 (2020) - [c84]Yan Huang, Fangguo Zhang, Zhi Hu, Zhijie Liu:
Optimized Arithmetic Operations for Isogeny-Based Cryptography on Huff Curves. ACISP 2020: 23-40 - [c83]Yudi Zhang, Debiao He, Fangguo Zhang, Xinyi Huang, Dawei Li:
An Efficient Blind Signature Scheme Based on SM2 Signature Algorithm. Inscrypt 2020: 368-384 - [c82]Zhuoran Zhang, Fangguo Zhang, Haibo Tian:
CSH: A Post-quantum Secret Handshake Scheme from Coding Theory. ESORICS (2) 2020: 317-335 - [c81]Haibo Tian, Huizhi Lin, Fangguo Zhang:
Design a Proof of Stake Based Directed Acyclic Graph Chain. FCS 2020: 150-165 - [c80]Yanmei Cao, Fangguo Zhang, Chongzhi Gao, Xiaofeng Chen:
New Practical Public-Key Deniable Encryption. ICICS 2020: 147-163 - [c79]Yunqi Wan, Li Chen, Fangguo Zhang:
Algebraic List Decoding of Elliptic Codes Through Module Basis Reduction. ISITA 2020: 185-189
2010 – 2019
- 2019
- [j80]Yan Huang, Fangguo Zhang, Zhijie Liu, Huang Zhang:
An Efficient Signature Scheme From Supersingular Elliptic Curve Isogenies. IEEE Access 7: 129834-129847 (2019) - [j79]Huige Li, Haibo Tian, Fangguo Zhang, Jiejie He:
Blockchain-based searchable symmetric encryption scheme. Comput. Electr. Eng. 73: 32-45 (2019) - [j78]Huige Li, Fangguo Zhang, Peiran Luo, Haibo Tian, Jiejie He:
How to retrieve the encrypted data on the blockchain. KSII Trans. Internet Inf. Syst. 13(11): 5560-5579 (2019) - [j77]Huang Zhang, Fangguo Zhang, Rong Cheng, Haibo Tian:
Efficient obfuscation for CNF circuits and applications in cloud computing. Soft Comput. 23(6): 2061-2072 (2019) - [c78]Bingsen Wang, Zhuoran Zhang, Fangguo Zhang:
Subliminal Channels in the Code-based Ring Signature Scheme. AsiaJCIS 2019: 146-150 - [c77]Fangguo Zhang, Zhijie Liu, Ping Wang, Haibo Tian:
Improving ECDLP Computation in Characteristic 2. Inscrypt 2019: 535-550 - [c76]Fangguo Zhang, Zhuoran Zhang:
ECC2: Error Correcting Code and Elliptic Curve Based Cryptosystem. CSS (1) 2019: 214-229 - [c75]Yunqi Wan, Li Chen, Fangguo Zhang:
Design of Guruswami-Sudan List Decoding for Elliptic Codes. ITW 2019: 1-5 - [c74]Fangguo Zhang, Shengli Liu:
Solving ECDLP via List Decoding. ProvSec 2019: 222-244 - 2018
- [j76]Zehong Chen, Fangguo Zhang, Peng Zhang, Joseph K. Liu, Jiwu Huang, Hanbang Zhao, Jian Shen:
Verifiable keyword search for secure big data-based mobile healthcare networks with fine-grained authorization control. Future Gener. Comput. Syst. 87: 712-724 (2018) - [j75]Shuguang Dai, Zhengjun Jiang, Fangguo Zhang:
Efficient leakage-resilient blind and partially blind signatures. Int. J. Embed. Syst. 10(1): 52-61 (2018) - [j74]Xu Ma, Fangguo Zhang, Xiaofeng Chen, Jian Shen:
Privacy preserving multi-party computation delegation for deep learning in cloud computing. Inf. Sci. 459: 103-116 (2018) - [c73]Haibo Tian, Xiaofeng Chen, Yong Ding, Xiaoyan Zhu, Fangguo Zhang:
AFCoin: A Framework for Digital Fiat Currency of Central Banks Based on Account Model. Inscrypt 2018: 70-85 - [c72]Huang Zhang, Fangguo Zhang, Haibo Tian, Man Ho Au:
Anonymous Post-Quantum Cryptocash. Financial Cryptography 2018: 461-479 - [i50]Fangguo Zhang, Shengli Liu:
Solving ECDLP via List Decoding. IACR Cryptol. ePrint Arch. 2018: 795 (2018) - 2017
- [j73]Steven D. Galbraith, Ping Wang, Fangguo Zhang:
Computing elliptic curve discrete logarithms with improved baby-step giant-step algorithm. Adv. Math. Commun. 11(3): 453-469 (2017) - [j72]Jiayong Tang, Fangguo Zhang:
A new code-based encryption scheme and its applications. Int. J. High Perform. Comput. Netw. 10(6): 515-523 (2017) - [j71]Huige Li, Fangguo Zhang, Chun-I Fan:
Deniable Searchable Symmetric Encryption. Inf. Sci. 402: 233-243 (2017) - [j70]Zehong Chen, Peng Zhang, Fangguo Zhang, Jiwu Huang:
Ciphertext policy attribute-based encryption supporting unbounded attribute space from R-LWE. KSII Trans. Internet Inf. Syst. 11(4): 2292-2309 (2017) - [c71]Zheng Zhang, Fangguo Zhang, Huang Zhang:
Implementing Indistinguishability Obfuscation Using GGH15. Inscrypt 2017: 27-43 - [c70]Fangguo Zhang:
Bit Security of the Hyperelliptic Curves Diffie-Hellman Problem. ProvSec 2017: 219-235 - [i49]Huige Li, Fangguo Zhang, Jiejie He, Haibo Tian:
A Searchable Symmetric Encryption Scheme using BlockChain. CoRR abs/1711.01030 (2017) - [i48]Huige Li, Haibo Tian, Fangguo Zhang:
Block Chain based Searchable Symmetric Encryption. IACR Cryptol. ePrint Arch. 2017: 447 (2017) - [i47]Huang Zhang, Fangguo Zhang, Haibo Tian, Man Ho Au:
Anonymous Post-Quantum Cryptocash. IACR Cryptol. ePrint Arch. 2017: 716 (2017) - 2016
- [j69]Shuguang Dai, Huige Li, Fangguo Zhang:
Memory leakage-resilient searchable symmetric encryption. Future Gener. Comput. Syst. 62: 76-84 (2016) - [j68]Lingling Xu, Fangguo Zhang, Willy Susilo, Yamin Wen:
Solutions to the anti-piracy problem in oblivious transfer. J. Comput. Syst. Sci. 82(3): 466-476 (2016) - [j67]Haibo Tian, Fangguo Zhang, Baodian Wei:
A lattice-based partially blind signature. Secur. Commun. Networks 9(12): 1820-1828 (2016) - [c69]Shuai Han, Shengli Liu, Fangguo Zhang, Kefei Chen:
Homomorphic Linear Authentication Schemes from (ε)-Authentication Codes. AsiaCCS 2016: 487-498 - 2015
- [j66]Shuguang Dai, Jinfeng Wei, Fangguo Zhang:
Memory leakage-resilient secret sharing schemes. Sci. China Inf. Sci. 58(11): 1-9 (2015) - [j65]Rong Cheng, Fangguo Zhang:
Obfuscation for multi-use re-encryption and its application in cloud computing. Concurr. Comput. Pract. Exp. 27(8): 2170-2190 (2015) - [j64]Xu Ma, Jin Li, Fangguo Zhang:
Refereed Computation Delegation of Private Sequence Comparison in Cloud Computing. Int. J. Netw. Secur. 17(6): 743-753 (2015) - [j63]Rong Cheng, Fangguo Zhang:
Lattice-based obfuscation for re-encryption functions. Secur. Commun. Networks 8(9): 1648-1658 (2015) - [j62]Feng Diao, Fangguo Zhang, Xiangguo Cheng:
A Privacy-Preserving Smart Metering Scheme Using Linkable Anonymous Credential. IEEE Trans. Smart Grid 6(1): 461-467 (2015) - [c68]Haibo Tian, Fangguo Zhang, Kui Ren:
Secure Bilinear Pairing Outsourcing Made More Efficient and Flexible. AsiaCCS 2015: 417-426 - [c67]Rong Cheng, Jingbo Yan, Chaowen Guan, Fangguo Zhang, Kui Ren:
Verifiable Searchable Symmetric Encryption from Indistinguishability Obfuscation. AsiaCCS 2015: 621-626 - [c66]Chaowen Guan, Kui Ren, Fangguo Zhang, Florian Kerschbaum, Jia Yu:
Symmetric-Key Based Proofs of Retrievability Supporting Public Verification. ESORICS (1) 2015: 203-223 - [i46]Yusong Du, Baodian Wei, Fangguo Zhang, Huang Zhang:
On the (Fast) Algebraic Immunity of Boolean Power Functions. IACR Cryptol. ePrint Arch. 2015: 435 (2015) - [i45]Yusong Du, Baodian Wei, Fangguo Zhang, Huang Zhang:
On the Resistance of Prime-variable Rotation Symmetric Boolean Functions against Fast Algebraic Attacks. IACR Cryptol. ePrint Arch. 2015: 436 (2015) - [i44]Steven D. Galbraith, Ping Wang, Fangguo Zhang:
Computing Elliptic Curve Discrete Logarithms with Improved Baby-step Giant-step Algorithm. IACR Cryptol. ePrint Arch. 2015: 605 (2015) - [i43]Fangguo Zhang:
Bit Security of the Hyperelliptic Curves Diffie-Hellman Problem. IACR Cryptol. ePrint Arch. 2015: 614 (2015) - [i42]Huang Zhang, Fangguo Zhang, Baodian Wei, Yusong Du:
Self-bilinear Map from One Way Encoding System and Indistinguishability Obfuscation. IACR Cryptol. ePrint Arch. 2015: 747 (2015) - 2014
- [j61]Bo Zhang, Rong Cheng, Fangguo Zhang:
Secure Hamming distance based record linkage with malicious adversaries. Comput. Electr. Eng. 40(6): 1906-1916 (2014) - [j60]Bo Zhang, Fangguo Zhang:
Secure linear system computation in the presence of malicious adversaries. Sci. China Inf. Sci. 57(9): 1-10 (2014) - [j59]Bo Zhang, Fangguo Zhang:
Secure similarity coefficients computation for binary data and its extensions. Concurr. Comput. Pract. Exp. 26(5): 1023-1037 (2014) - [j58]Shengli Liu, Fangguo Zhang, Kefei Chen:
Public-key encryption scheme with selective opening chosen-ciphertext security based on the Decisional Diffie-Hellman assumption. Concurr. Comput. Pract. Exp. 26(8): 1506-1519 (2014) - [j57]Xiaofeng Chen, Fangguo Zhang, Willy Susilo, Haibo Tian, Jin Li, Kwangjo Kim:
Identity-based chameleon hashing and signatures without key exposure. Inf. Sci. 265: 198-210 (2014) - [j56]Fangguo Zhang, Xu Ma, Shengli Liu:
Efficient computation outsourcing for inverting a class of homomorphic functions. Inf. Sci. 286: 19-28 (2014) - [j55]Lingling Xu, Fangguo Zhang, Shaohua Tang:
Timed-release oblivious transfer. Secur. Commun. Networks 7(7): 1138-1149 (2014) - [c65]Fei Shao, Rong Cheng, Fangguo Zhang:
A Full Privacy-Preserving Scheme for Location-Based Services. ICT-EurAsia 2014: 596-601 - [c64]Baodian Wei, Yusong Du, Huang Zhang, Fangguo Zhang, Haibo Tian, Chong-zhi Gao:
Identity Based Threshold Ring Signature from Lattices. NSS 2014: 233-245 - [e2]Zhenfu Cao, Fangguo Zhang:
Pairing-Based Cryptography - Pairing 2013 - 6th International Conference, Beijing, China, November 22-24, 2013, Revised Selected Papers. Lecture Notes in Computer Science 8365, Springer 2014, ISBN 978-3-319-04872-7 [contents] - 2013
- [j54]Haibo Tian, Fangguo Zhang, Xiaofeng Chen, Baodian Wei:
Selectively unforgeable but existentially forgeable signature schemes and applications. Sci. China Inf. Sci. 56(1): 1-14 (2013) - [j53]Xu Ma, Jin Li, Fangguo Zhang:
Outsourcing computation of modular exponentiations in cloud computing. Clust. Comput. 16(4): 787-796 (2013) - [j52]Fangguo Zhang, Ping Wang:
Speeding up elliptic curve discrete logarithm computations with point halving. Des. Codes Cryptogr. 67(2): 197-208 (2013) - [j51]Jinfeng Yang, Rong Cheng, Wenming Liu, Yong Xiao, Fangguo Zhang:
Cryptoanalysis and improvement of smart prepayment meter protocol in standard Q/GDW 365. Int. J. Grid Util. Comput. 4(1): 40-46 (2013) - [j50]Haibo Tian, Xiaofeng Chen, Fangguo Zhang, Baodian Wei, Zhengtao Jiang, Yi Liu:
A non-delegatable strong designated verifier signature in ID-based setting for mobile environment. Math. Comput. Model. 58(5-6): 1289-1300 (2013) - [c63]Shengli Liu, Kouichi Sakurai, Jian Weng, Fangguo Zhang, Yunlei Zhao:
Security Model and Analysis of FHMQV, Revisited. Inscrypt 2013: 255-269 - [c62]Ping Wang, Fangguo Zhang:
Improving the Parallelized Pollard Rho Method for Computing Elliptic Curve Discrete Logarithms. EIDWT 2013: 285-291 - [c61]Xu Ma, Fangguo Zhang, Jin Li:
Verifiable Evaluation of Private Polynomials. EIDWT 2013: 451-458 - [c60]Rong Cheng, Fangguo Zhang:
Secure Obfuscation of Conditional Re-encryption with Keyword Search. INCoS 2013: 30-37 - [c59]Rong Cheng, Feng Diao, Fangguo Zhang:
On Obfuscating Set-Membership Predicate Functions. INCoS 2013: 304-308 - [i41]Fangguo Zhang, Xu Ma, Shengli Liu:
Efficient Computation Outsourcing for Inverting a Class of Homomorphic Functions. IACR Cryptol. ePrint Arch. 2013: 44 (2013) - 2012
- [j49]Yamin Wen, Fangguo Zhang, Lingling Xu:
Secret handshakes from ID-based message recovery signatures: A new generic approach. Comput. Electr. Eng. 38(1): 96-104 (2012) - [j48]Xingwen Zhao, Fangguo Zhang:
Tracing and revoking scheme for dynamic privileges against pirate rebroadcast. Comput. Secur. 31(1): 59-69 (2012) - [j47]Qiping Lin, Fangguo Zhang:
Scalar Multiplication on Kummer Surface Revisited. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(1): 410-413 (2012) - [j46]Yusong Du, Fangguo Zhang:
A Class of 1-Resilient Functions in Odd Variables with High Nonlinearity and Suboptimal Algebraic Immunity. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(1): 417-420 (2012) - [j45]Xingwen Zhao, Fangguo Zhang:
Times Limited Accountable Anonymous Online Submission Control System from Single-Verifier k-times Group Signature. Informatica (Slovenia) 36(1): 75-82 (2012) - [j44]Qiping Lin, Fangguo Zhang:
Efficient precomputation schemes of kP+IQ. Inf. Process. Lett. 112(11): 462-466 (2012) - [j43]Ping Wang, Fangguo Zhang:
Computing elliptic curve discrete logarithms with the negation map. Inf. Sci. 195: 277-286 (2012) - [j42]Jin Li, Fangguo Zhang, Xiaofeng Chen, Kwangjo Kim, Duncan S. Wong:
Generic security-amplifying methods of ordinary digital signatures. Inf. Sci. 201: 128-139 (2012) - [j41]Ping Wang, Fangguo Zhang:
An Efficient Collision Detection Method for Computing Discrete Logarithms with Pollard's Rho. J. Appl. Math. 2012: 635909:1-635909:15 (2012) - [j40]Ping Wang, Fangguo Zhang:
Improved Pollard rho method for computing discrete logarithms over finite extension fields. J. Comput. Appl. Math. 236(17): 4336-4343 (2012) - [j39]Qiping Lin, Fangguo Zhang:
ECC-Based Grouping-Proof RFID for Inpatient Medication Safety. J. Medical Syst. 36(6): 3527-3531 (2012) - [j38]Xingwen Zhao, Fangguo Zhang:
Fully CCA2 secure identity-based broadcast encryption with black-box accountable authority. J. Syst. Softw. 85(3): 708-716 (2012) - [j37]Changan Zhao, Fangguo Zhang, Dongqing Xie:
Faster Computation of Self-Pairings. IEEE Trans. Inf. Theory 58(5): 3266-3272 (2012) - [c58]Fangguo Zhang, Qiping Lin, Shengli Liu:
Zero-Value Point Attacks on Kummer-Based Cryptosystem. ACNS 2012: 293-310 - [c57]Haibo Tian, Xiaofeng Chen, Fangguo Zhang, Baodian Wei, Zhengtao Jiang, Yi Liu:
An Efficient Identity-Based Strong Designated Verifier Signature without Delegatability. IMIS 2012: 81-88 - [c56]Bo Zhang, Fangguo Zhang:
Secure Similarity Coefficients Computation with Malicious Adversaries. INCoS 2012: 303-310 - [c55]Xu Ma, Jin Li, Fangguo Zhang:
Efficient and Secure Batch Exponentiations Outsourcing in Cloud Computing. INCoS 2012: 600-605 - [c54]Shengli Liu, Fangguo Zhang, Kefei Chen:
Selective Opening Chosen Ciphertext Security Directly from the DDH Assumption. NSS 2012: 100-112 - [i40]Bo Zhang, Fangguo Zhang:
Secure Similarity Coefficients Computation with Malicious Adversaries. IACR Cryptol. ePrint Arch. 2012: 202 (2012) - [i39]Yusong Du, Fangguo Zhang:
On the Existence of Boolean Functions with Optimal Resistance against Fast Algebraic Attacks. IACR Cryptol. ePrint Arch. 2012: 210 (2012) - 2011
- [j36]Xingwen Zhao, Fangguo Zhang, Haibo Tian:
Dynamic asymmetric group key agreement for ad hoc networks. Ad Hoc Networks 9(5): 928-939 (2011) - [j35]Xiaofeng Chen, Fangguo Zhang, Haibo Tian, Baodian Wei, Kwangjo Kim:
Discrete logarithm based chameleon hashing and signatures without key exposure. Comput. Electr. Eng. 37(4): 614-623 (2011) - [j34]Changan Zhao, Dongqing Xie, Fangguo Zhang, Jingwei Zhang, Binglong Chen:
Computing bilinear pairings on elliptic curves with automorphisms. Des. Codes Cryptogr. 58(1): 35-44 (2011) - [j33]Xingwen Zhao, Fangguo Zhang:
A New Type of ID-based Encryption System and Its Application to Pay-TV Systems. Int. J. Netw. Secur. 13(3): 161-166 (2011) - [j32]Xingwen Zhao, Fangguo Zhang:
Analysis on Hu et al.'s Identity-based Broadcast Encryption. Int. J. Netw. Secur. 13(3): 178-180 (2011) - [j31]Xiaofeng Chen, Qianhong Wu, Fangguo Zhang, Haibo Tian, Baodian Wei, Byoungcheon Lee, Hyunrok Lee, Kwangjo Kim:
New receipt-free voting scheme using double-trapdoor commitment. Inf. Sci. 181(8): 1493-1502 (2011) - [j30]Bo Zhang, Fangguo Zhang:
An efficient public key encryption with conjunctive-subset keywords search. J. Netw. Comput. Appl. 34(1): 262-267 (2011) - [j29]Xu Ma, Lingling Xu, Fangguo Zhang:
Oblivious transfer with timed-release receiver's privacy. J. Syst. Softw. 84(3): 460-464 (2011) - [j28]Yamin Wen, Fangguo Zhang:
Delegatable secret handshake scheme. J. Syst. Softw. 84(12): 2284-2292 (2011) - [j27]Xiaofeng Chen, Willy Susilo, Fangguo Zhang, Haibo Tian, Jin Li:
Identity-based trapdoor mercurial commitments and applications. Theor. Comput. Sci. 412(39): 5498-5512 (2011) - [c53]Yusong Du, Fangguo Zhang:
Finding More Boolean Functions with Maximum Algebraic Immunity Based on Univariate Polynomial Representation. ACISP 2011: 47-60 - [c52]Fangguo Zhang, Ping Wang:
On Relationship of Computational Diffie-Hellman Problem and Computational Square-Root Exponent Problem. IWCC 2011: 283-293 - [c51]Yusong Du, Fangguo Zhang:
Two Applications of an Incomplete Additive Character Sum to Estimating Nonlinearity of Boolean Functions. ICICS 2011: 190-201 - [c50]Yusong Du, Fangguo Zhang, Meicheng Liu:
On the Resistance of Boolean Functions against Fast Algebraic Attacks. ICISC 2011: 261-274 - [c49]Xingwen Zhao, Fangguo Zhang:
Traitor Tracing against Public Collaboration. ISPEC 2011: 302-316 - [c48]Rong Cheng, Bo Zhang, Fangguo Zhang:
Secure Obfuscation of Encrypted Verifiable Encrypted Signatures. ProvSec 2011: 188-203 - [i38]Ping Wang, Fangguo Zhang:
Computing Elliptic Curve Discrete Logarithms with the Negation Map. IACR Cryptol. ePrint Arch. 2011: 8 (2011) - [i37]Xingwen Zhao, Fangguo Zhang:
Traitor Tracing against Public Collaboration (Full Version). IACR Cryptol. ePrint Arch. 2011: 84 (2011) - [i36]Fangguo Zhang:
The Computational Square-Root Exponent Problem- Revisited. IACR Cryptol. ePrint Arch. 2011: 263 (2011) - [i35]Fangguo Zhang, Ping Wang:
Speeding Up Elliptic Curve Discrete Logarithm Computations with Point Halving. IACR Cryptol. ePrint Arch. 2011: 461 (2011) - 2010
- [j26]Fangguo Zhang:
Twisted Ate pairing on hyperelliptic curves and applications. Sci. China Inf. Sci. 53(8): 1528-1538 (2010) - [j25]Baodian Wei, Fangguo Zhang, Xiaofeng Chen:
Efficient Online/Offline Signcryption Scheme. Intell. Autom. Soft Comput. 16(3): 449-459 (2010) - [c47]Xiaofeng Chen, Fangguo Zhang, Willy Susilo, Haibo Tian, Jin Li, Kwangjo Kim:
Identity-Based Chameleon Hash Scheme without Key Exposure. ACISP 2010: 200-215 - [c46]Xiaofeng Chen, Haibo Tian, Fangguo Zhang, Yong Ding:
Comments and Improvements on Key-Exposure Free Chameleon Hashing Based on Factoring. Inscrypt 2010: 415-426 - [c45]Yamin Wen, Fangguo Zhang:
A New Revocable Secret Handshake Scheme with Backward Unlinkability. EuroPKI 2010: 17-30 - [c44]Xiaofeng Chen, Fangguo Zhang, Haibo Tian, Qianhong Wu, Yi Mu, Jangseong Kim, Kwangjo Kim:
Three-Round Abuse-Free Optimistic Contract Signing with Everlasting Secrecy. Financial Cryptography 2010: 304-311 - [c43]Lingling Xu, Fangguo Zhang:
Oblivious Transfer with Complex Attribute-Based Access Control. ICISC 2010: 370-395 - [i34]Qiping Lin, Fangguo Zhang:
Halving on Binary Edwards Curves. IACR Cryptol. ePrint Arch. 2010: 4 (2010) - [i33]Changan Zhao, Fangguo Zhang, Dongqing Xie:
Faster Computation of Self-pairings. IACR Cryptol. ePrint Arch. 2010: 399 (2010)
2000 – 2009
- 2009
- [j24]Xiaofeng Chen, Guomin Chen, Fangguo Zhang, Baodian Wei, Yi Mu:
Identity-based Universal Designated Verifier Signature Proof System. Int. J. Netw. Secur. 8(1): 52-58 (2009) - [j23]Fangguo Zhang, Xiaofeng Chen:
Cryptanalysis and improvement of an ID-based ad-hoc anonymous identification scheme at CT-RSA 05. Inf. Process. Lett. 109(15): 846-849 (2009) - [c42]Changan Zhao, Dongqing Xie, Fangguo Zhang, Chong-zhi Gao, Jingwei Zhang:
Improved Implementations of Cryptosystems Based on Tate Pairing. ISA 2009: 145-151 - [c41]Fangguo Zhang, Xingwen Zhao, Xiaofeng Chen:
ID-Based Adaptive Oblivious Transfer. WISA 2009: 133-147 - [e1]Josef Pieprzyk, Fangguo Zhang:
Provable Security, Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings. Lecture Notes in Computer Science 5848, Springer 2009, ISBN 978-3-642-04641-4 [contents] - [i32]Xiaofeng Chen, Fangguo Zhang, Haibo Tian, Baodian Wei, Kwangjo Kim:
Key-Exposure Free Chameleon Hashing and Signatures Based on Discrete Logarithm Systems. IACR Cryptol. ePrint Arch. 2009: 35 (2009) - [i31]Xiaofeng Chen, Haibo Tian, Fangguo Zhang:
Comments and Improvements on Chameleon Hashing Without Key Exposure Based on Factoring. IACR Cryptol. ePrint Arch. 2009: 319 (2009) - [i30]Xiaofeng Chen, Fangguo Zhang, Haibo Tian, Kwangjo Kim:
Identity-Based Chameleon Hash Scheme Without Key Exposure. IACR Cryptol. ePrint Arch. 2009: 400 (2009) - 2008
- [j22]Changan Zhao, Fangguo Zhang, Jiwu Huang:
Efficient Tate pairing computation using double-base chains. Sci. China Ser. F Inf. Sci. 51(8): 1096-1105 (2008) - [j21]Xibin Lin, Changan Zhao, Fangguo Zhang, Yanming Wang:
Computing the Ate Pairing on Elliptic Curves with Embedding Degree k = 9. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(9): 2387-2393 (2008) - [j20]Changan Zhao, Fangguo Zhang, Jiwu Huang:
All Pairings Are in a Group. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(10): 3084-3087 (2008) - [j19]Changan Zhao, Fangguo Zhang, Jiwu Huang:
A note on the Ate pairing. Int. J. Inf. Sec. 7(6): 379-382 (2008) - [j18]Fangguo Zhang, Xiaofeng Chen, Yi Mu, Willy Susilo:
A New and Efficient Signature on Commitment Values. Int. J. Netw. Secur. 7(1): 100-105 (2008) - [j17]Baodian Wei, Fangguo Zhang, Xiaofeng Chen:
A New Type of Designated Confirmer Signatures for a Group of Individuals. Int. J. Netw. Secur. 7(2): 293-300 (2008) - [j16]Xiaofeng Chen, Fangguo Zhang, Haibo Tian, Baodian Wei, Willy Susilo, Yi Mu, Hyunrok Lee, Kwangjo Kim:
Efficient generic on-line/off-line (threshold) signatures without key exposure. Inf. Sci. 178(21): 4192-4203 (2008) - [j15]Shengli Liu, Xiaofeng Chen, Fangguo Zhang:
Forgeability of Wang-Tang-Li's ID-Based Restrictive Partially Blind Signature Scheme. J. Comput. Sci. Technol. 23(2): 265-269 (2008) - [c40]Jin Li, Kwangjo Kim, Fangguo Zhang, Duncan S. Wong:
Generic Security-Amplifying Methods of Ordinary Digital Signatures. ACNS 2008: 224-241 - [c39]Fangguo Zhang, Xiaofeng Chen, Baodian Wei:
Efficient designated confirmer signature from bilinear pairings. AsiaCCS 2008: 363-368 - [i29]Changan Zhao, Fangguo Zhang, Jiwu Huang:
All Pairings Are in a Group. IACR Cryptol. ePrint Arch. 2008: 85 (2008) - [i28]Changan Zhao, Dongqing Xie, Fangguo Zhang, Jingwei Zhang, Binglong Chen:
Computing Bilinear Pairings on Elliptic Curves with Automorphisms. IACR Cryptol. ePrint Arch. 2008: 209 (2008) - [i27]Changan Zhao, Fangguo Zhang, Dongqing Xie:
Reducing the Complexity of the Weil Pairing Computation. IACR Cryptol. ePrint Arch. 2008: 212 (2008) - [i26]Fangguo Zhang:
Twisted Ate Pairing on Hyperelliptic Curves and Applications. IACR Cryptol. ePrint Arch. 2008: 274 (2008) - 2007
- [j14]Xiaofeng Chen, Fangguo Zhang, Shengli Liu:
ID-based restrictive partially blind signatures and applications. J. Syst. Softw. 80(2): 164-171 (2007) - [c38]Xiaofeng Chen, Fangguo Zhang, Willy Susilo, Yi Mu:
Efficient Generic On-Line/Off-Line Signatures Without Key Exposure. ACNS 2007: 18-30 - [c37]Lei Zhang, Futai Zhang, Fangguo Zhang:
New Efficient Certificateless Signature Scheme. EUC Workshops 2007: 692-703 - [c36]Qianhong Wu, Willy Susilo, Yi Mu, Fangguo Zhang:
Efficient Partially Blind Signatures with Provable Security. ICCSA (3) 2007: 1096-1105 - [c35]Baodian Wei, Fangguo Zhang, Xiaofeng Chen:
Society-oriented Designated Confirmer Signatures. ICNC (5) 2007: 707-712 - [c34]Baodian Wei, Fangguo Zhang, Xiaofeng Chen:
ID-based Ring Proxy Signatures. ISIT 2007: 1031-1035 - [c33]Jin Li, Kwangjo Kim, Fangguo Zhang, Xiaofeng Chen:
Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature. ProvSec 2007: 208-217 - [i25]Shengli Liu, Xiaofeng Chen, Fangguo Zhang:
On the Forgeability of Wang-Tang-Li's ID-Based Restrictive Partially Blind Signature. IACR Cryptol. ePrint Arch. 2007: 225 (2007) - [i24]Changan Zhao, Fangguo Zhang, Jiwu Huang:
A Note on the Ate Pairing. IACR Cryptol. ePrint Arch. 2007: 247 (2007) - [i23]Xibin Lin, Changan Zhao, Fangguo Zhang, Yanming Wang:
Computing the Ate Pairing on Elliptic Curves with Embedding Degree k=9. IACR Cryptol. ePrint Arch. 2007: 434 (2007) - 2006
- [c32]Qianhong Wu, Yi Mu, Willy Susilo, Fangguo Zhang:
Efficient Signcryption Without Random Oracles. ATC 2006: 449-458 - [c31]Jin Li, Xiaofeng Chen, Fangguo Zhang, Yanming Wang:
Generalization of the Selective-ID Security Model for HIBS Protocols. CIS 2006: 894-902 - [c30]Jin Li, Fangguo Zhang, Yanming Wang:
A Strong Identity Based Key-Insulated Cryptosystem. EUC Workshops 2006: 352-361 - [c29]Jin Li, Fangguo Zhang, Yanming Wang:
A New Hierarchical ID-Based Cryptosystem and CCA-Secure PKE. EUC Workshops 2006: 362-371 - [c28]Xiaofeng Chen, Fangguo Zhang, Yi Mu, Willy Susilo:
Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings. Financial Cryptography 2006: 251-265 - [c27]Qianhong Wu, Willy Susilo, Yi Mu, Fangguo Zhang:
Efficient Partially Blind Signatures with Provable Security. ICCSA (3) 2006: 345-354 - [c26]Qianhong Wu, Yi Mu, Willy Susilo, Fangguo Zhang:
Privately Retrieve Data from Large Databases. ISPEC 2006: 367-378 - [c25]Qianhong Wu, Willy Susilo, Yi Mu, Fangguo Zhang:
Ad Hoc Group Signatures. IWSEC 2006: 120-135 - [c24]Fangguo Zhang, Xiaofeng Chen, Willy Susilo, Yi Mu:
A New Signature Scheme Without Random Oracles from Bilinear Pairings. VIETCRYPT 2006: 67-80 - [i22]Changan Zhao, Fangguo Zhang, Jiwu Huang:
Efficient Tate Pairing Computation Using Double-Base Chains. IACR Cryptol. ePrint Arch. 2006: 201 (2006) - [i21]Shidi Xu, Yi Mu, Willy Susilo, Xiaofeng Chen, Xinyi Huang, Fangguo Zhang:
Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security. IACR Cryptol. ePrint Arch. 2006: 236 (2006) - [i20]Changan Zhao, Fangguo Zhang, Jiwu Huang:
Speeding up the Bilinear Pairings Computation on Curves with Automorphisms. IACR Cryptol. ePrint Arch. 2006: 474 (2006) - [i19]Shengli Liu, Fangguo Zhang:
Cryptanalysis of REESSE1+ Public Key Cryptosystem. IACR Cryptol. ePrint Arch. 2006: 480 (2006) - 2005
- [j13]Chih-Yin Lin, Tzong-Chen Wu, Fangguo Zhang, Jing-Jang Hwang:
New identity-based society oriented signature schemes from pairings on elliptic curves. Appl. Math. Comput. 160(1): 245-260 (2005) - [j12]Fangguo Zhang, Kwangjo Kim:
Cryptanalysis of Lee-Hwang-Li's key authentication scheme. Appl. Math. Comput. 161(1): 101-107 (2005) - [j11]Fangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo:
Attack on Han et al.'s ID-based confirmer (undeniable) signature at ACM-EC'03. Appl. Math. Comput. 170(2): 1166-1169 (2005) - [j10]Fangguo Zhang:
Cryptanalysis of Chang et al.'s signature scheme with message recovery. IEEE Commun. Lett. 9(4): 358-359 (2005) - [j9]Xiaofeng Chen, Fangguo Zhang, Baodian Wei:
Comment on the Public Key Substitution Attacks. Int. J. Netw. Secur. 1(3): 168-172 (2005) - [j8]Fangguo Zhang, Xiaofeng Chen:
Cryptanalysis of Huang-Chang partially blind signature scheme. J. Syst. Softw. 76(3): 323-325 (2005) - [c23]Victor K. Wei, Tsz Hon Yuen, Fangguo Zhang:
Group Signature Where Group Manager, Members and Open Authority Are Identity-Based. ACISP 2005: 468-480 - [c22]Fangguo Zhang, Yi Mu, Willy Susilo:
Reducing Security Overhead for Mobile Networks. AINA 2005: 398-403 - [c21]Willy Susilo, Fangguo Zhang, Yi Mu:
Privacy-Enhanced Internet Storage. AINA 2005: 603-608 - [c20]Xiaofeng Chen, Fangguo Zhang, Shengli Liu:
ID-Based Restrictive Partially Blind Signatures. CIS (2) 2005: 117-124 - [c19]Xinyi Huang, Yi Mu, Willy Susilo, Fangguo Zhang, Xiaofeng Chen:
A Short Proxy Signature Scheme: Efficient Authentication in the Ubiquitous World. EUC Workshops 2005: 480-489 - [c18]Fangguo Zhang, Willy Susilo, Yi Mu, Xiaofeng Chen:
Identity-Based Universal Designated Verifier Signatures. EUC Workshops 2005: 825-834 - [c17]Fangguo Zhang, Willy Susilo, Yi Mu:
Identity-Based Partial Message Recovery Signatures (or How to Shorten ID-Based Signatures). Financial Cryptography 2005: 45-56 - [c16]Qianhong Wu, Fangguo Zhang, Willy Susilo, Yi Mu:
An Efficient Static Blind Ring Signature Scheme. ICISC 2005: 410-423 - [i18]Fangguo Zhang, Xiaofeng Chen:
Cryptanalysis and improvement of an ID-based ad-hoc anonymous identification scheme at CT-RSA 05. IACR Cryptol. ePrint Arch. 2005: 103 (2005) - [i17]Victor K. Wei, Tsz Hon Yuen, Fangguo Zhang:
Group Signature where Group Manager, Members and Open Authority are Identity-Based. IACR Cryptol. ePrint Arch. 2005: 188 (2005) - [i16]Fangguo Zhang, Xiaofeng Chen:
Attack on Okamoto et al.'s New Short Signature Schemes. IACR Cryptol. ePrint Arch. 2005: 240 (2005) - [i15]Xiaofeng Chen, Fangguo Zhang, Shengli Liu:
ID-based Restrictive Partially Blind Signatures and Applications. IACR Cryptol. ePrint Arch. 2005: 319 (2005) - [i14]Fangguo Zhang, Xiaofeng Chen, Willy Susilo, Yi Mu:
A New Short Signature Scheme Without Random Oracles from Bilinear Pairings. IACR Cryptol. ePrint Arch. 2005: 386 (2005) - 2004
- [j7]Fangguo Zhang, Xiaofeng Chen:
Attack on an ID-based authenticated group key agreement scheme from PKC 2004. Inf. Process. Lett. 91(4): 191-193 (2004) - [j6]Shengli Liu, Fangguo Zhang, Kefei Chen:
Authenticating Tripartite Key Agreement Protocol with Pairings. J. Comput. Sci. Technol. 19(2): 169-176 (2004) - [c15]Willy Susilo, Fangguo Zhang, Yi Mu:
Identity-Based Strong Designated Verifier Signature Schemes. ACISP 2004: 313-324 - [c14]Xiaofeng Chen, Fangguo Zhang, Kwangjo Kim:
Limited Verifier Signature from Bilinear Pairings. ACNS 2004: 135-148 - [c13]Yi Mu, Fangguo Zhang, Willy Susilo:
Deniable Partial Proxy Signatures. ASIAN 2004: 182-194 - [c12]Willy Susilo, Yi Mu, Fangguo Zhang:
Perfect Concurrent Signature Schemes. ICICS 2004: 14-26 - [c11]Xiaofeng Chen, Fangguo Zhang, Divyan M. Konidala, Kwangjo Kim:
New ID-Based Threshold Signature Scheme from Bilinear Pairings. INDOCRYPT 2004: 371-383 - [c10]Xiaofeng Chen, Fangguo Zhang, Kwangjo Kim:
Chameleon Hashing Without Key Exposure. ISC 2004: 87-98 - [c9]Fangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo:
An Efficient Signature Scheme from Bilinear Pairings and Its Applications. Public Key Cryptography 2004: 277-290 - [i13]Xiaofeng Chen, Fangguo Zhang, Kwangjo Kim:
Chameleon Hashing without Key Exposure. IACR Cryptol. ePrint Arch. 2004: 38 (2004) - [i12]Fangguo Zhang:
Cryptanalysis of Chang et al.'s Signature Scheme with Message Recovery. IACR Cryptol. ePrint Arch. 2004: 213 (2004) - 2003
- [j5]Fangguo Zhang, Kwangjo Kim:
A Universal Forgery on Araki et al.'s Convertible Limited Verifier Signature Scheme. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 86-A(2): 515-516 (2003) - [j4]Changjie Wang, Fangguo Zhang, Yumin Wang:
Secure Web Transaction with Anonymous Mobile Agent over Internet. J. Comput. Sci. Technol. 18(1): 84-89 (2003) - [c8]Fangguo Zhang, Kwangjo Kim:
Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Pairings. ACISP 2003: 312-323 - [c7]Vu Dong Tô, Reihaneh Safavi-Naini, Fangguo Zhang:
New traitor tracing schemes using bilinear map. Digital Rights Management Workshop 2003: 67-76 - [c6]Yan Xie, Fangguo Zhang, Xiaofeng Chen, Kwangjo Kim:
ID-Based Distributed "Magic Ink" Signature from Pairings. ICICS 2003: 249-259 - [c5]Fangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo:
Efficient Verifiably Encrypted Signature and Partially Blind Signature from Bilinear Pairings. INDOCRYPT 2003: 191-204 - [i11]Fangguo Zhang, Kwangjo Kim:
Cryptanalysis of Lee-Hwang-Li's Key Authentication Scheme. IACR Cryptol. ePrint Arch. 2003: 11 (2003) - [i10]Xiaofeng Chen, Fangguo Zhang, Yumin Wang:
A New Approach to Prevent Blackmailing in E-Cash. IACR Cryptol. ePrint Arch. 2003: 55 (2003) - [i9]Chih-Yin Lin, Tzong-Chen Wu, Fangguo Zhang:
A Structured Multisignature Scheme from the Gap Diffie-Hellman Group. IACR Cryptol. ePrint Arch. 2003: 90 (2003) - [i8]Fangguo Zhang, Reihaneh Safavi-Naini, Chih-Yin Lin:
New Proxy Signature, Proxy Blind Signature and Proxy Ring Signature Schemes from Bilinear Pairing. IACR Cryptol. ePrint Arch. 2003: 104 (2003) - [i7]Xiaofeng Chen, Fangguo Zhang, Kwangjo Kim:
A New ID-based Group Signature Scheme from Bilinear Pairings. IACR Cryptol. ePrint Arch. 2003: 116 (2003) - [i6]Fangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo:
Attack on Han et al.'s ID-based Confirmer (Undeniable) Signature at ACM-EC'03. IACR Cryptol. ePrint Arch. 2003: 129 (2003) - [i5]Fangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo:
ID-Based Chameleon Hashes from Bilinear Pairings. IACR Cryptol. ePrint Arch. 2003: 208 (2003) - [i4]Fangguo Zhang, Xiaofeng Chen:
Attack on Two ID-based Authenticated Group Key Agreement Schemes. IACR Cryptol. ePrint Arch. 2003: 259 (2003) - 2002
- [j3]Changjie Wang, Fangguo Zhang, Yumin Wang:
SAWT: A New System for Secure and Anonymous Web Transactions over the Internet. J. Res. Pract. Inf. Technol. 34(1): 34-46 (2002) - [j2]Changjie Wang, Yumin Wang, Fangguo Zhang:
An Anonymous Mobile Agents Scheme for Secure Web Transaction over the Internet. Informatica (Slovenia) 26(3) (2002) - [j1]Fangguo Zhang, Futai Zhang, Yumin Wang:
Selection of Secure Hyperelliptic Curves of g_2 Based on a Subfield. J. Comput. Sci. Technol. 17(6): 836-842 (2002) - [c4]Fangguo Zhang, Shengli Liu, Kwangjo Kim:
Compact Representation of Domain Parameters of Hyperelliptic Curve Cryptosystems. ACISP 2002: 203-213 - [c3]Fangguo Zhang, Kwangjo Kim:
ID-Based Blind Signature and Ring Signature from Pairings. ASIACRYPT 2002: 533-547 - [i3]Fangguo Zhang, Shengli Liu, Kwangjo Kim:
ID-Based One Round Authenticated Tripartite Key Agreement Protocol with Pairings. IACR Cryptol. ePrint Arch. 2002: 122 (2002) - [i2]Fangguo Zhang, Kwangjo Kim:
Cryptanalysis of Two New Signature Schemes. IACR Cryptol. ePrint Arch. 2002: 167 (2002) - [i1]Fangguo Zhang, Shengli Liu, Kwangjo Kim:
Attack on A New Public Key Cryptosystem from ISC'02 (LNCS 2433). IACR Cryptol. ePrint Arch. 2002: 178 (2002) - 2001
- [c2]Fangguo Zhang, Futai Zhang, Yumin Wang:
Fast Scalar Multiplication on the Jacobian of a Family of Hyperelliptic Curves. ICICS 2001: 74-83 - 2000
- [c1]Fangguo Zhang, Futai Zhang, Yumin Wang:
Fair Electronic Cash Systems with Multiple Banks. SEC 2000: 461-470
Coauthor Index
aka: Chang-An Zhao
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-04 20:46 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint